At 2:26 PM +0100 12/14/09, Matthew Cini Sarreo wrote:
>Hello all,
>
>A minor technical note about Issue #22. Section 2.25, last paragraph reads:
>
>A CHILD_SA_NOT_FOUND notification SHOULD be sent when a peer receives a 
>request to rekey a Child SA that does not exist.  A peer that receives a 
>CHILD_SA_NOT_FOUND notification SHOULD silently delete the Child SA and send a 
>request to create a new Child SA from scratch.
>
>The original text does not mention what the SPI should be (it is practially 
>implied what it should be set to, but is still not mentioned in the text). 
>Presumably one would set the this to be the SPI of the Child SA that caused 
>the error (i.e the data for CHILD_SA_NOT_FOUND is the same as the SPI found 
>inside the REKEY_SA notification). This way, the Initiator knows which 
>rekeying attempt resulted in this error.
>
>I would propose to change this text to:
>A CHILD_SA_NOT_FOUND notification SHOULD be sent when a peer receives a 
>request to rekey a Child SA that does not exist.  The SA that the initiator 
>attempted to rekey is indicated by the SPI field in the Notify Payload, which 
>is copied from the SPI field in the REYEY_SA notification. A peer that 
>receives a CHILD_SA_NOT_FOUND notification SHOULD silently delete the Child SA 
>and send a request to create a new Child SA from scratch.

It is always good to make this kind of thing explicit. I will add this to the 
next draft.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to